forked from mystiq/hydrogen-web
implement megolm encryption
This commit is contained in:
parent
b1226d9220
commit
6bc30bb824
1 changed files with 147 additions and 0 deletions
147
src/matrix/e2ee/megolm/Encryption.js
Normal file
147
src/matrix/e2ee/megolm/Encryption.js
Normal file
|
@ -0,0 +1,147 @@
|
|||
/*
|
||||
Copyright 2020 The Matrix.org Foundation C.I.C.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
import {MEGOLM_ALGORITHM} from "../common.js";
|
||||
|
||||
export class Encryption {
|
||||
constructor({pickleKey, olm, account, storage, now, ownDeviceId}) {
|
||||
this._pickleKey = pickleKey;
|
||||
this._olm = olm;
|
||||
this._account = account;
|
||||
this._storage = storage;
|
||||
this._now = now;
|
||||
this._ownDeviceId = ownDeviceId;
|
||||
}
|
||||
|
||||
async encrypt(roomId, type, content, encryptionParams) {
|
||||
let session = new this._olm.OutboundGroupSession();
|
||||
try {
|
||||
const txn = await this._storage.readWriteTxn([
|
||||
this._storage.storeNames.inboundGroupSessions,
|
||||
this._storage.storeNames.outboundGroupSessions,
|
||||
]);
|
||||
let roomKeyMessage;
|
||||
let encryptedContent;
|
||||
try {
|
||||
let sessionEntry = await txn.outboundGroupSessions.get(roomId);
|
||||
if (sessionEntry) {
|
||||
session.unpickle(this._pickleKey, sessionEntry.session);
|
||||
}
|
||||
if (!sessionEntry || this._needsToRotate(session, sessionEntry.createdAt, encryptionParams)) {
|
||||
// in the case of rotating, recreate a session as we already unpickled into it
|
||||
if (session) {
|
||||
session.free();
|
||||
session = new this._olm.OutboundGroupSession();
|
||||
}
|
||||
session.create();
|
||||
roomKeyMessage = this._createRoomKeyMessage(session, roomId);
|
||||
this._storeAsInboundSession(session, roomId, txn);
|
||||
// TODO: we could tell the Decryption here that we have a new session so it can add it to its cache
|
||||
}
|
||||
encryptedContent = this._encryptContent(roomId, session, type, content);
|
||||
txn.outboundGroupSessions.set({
|
||||
roomId,
|
||||
session: session.pickle(this._pickleKey),
|
||||
createdAt: sessionEntry?.createdAt || this._now(),
|
||||
});
|
||||
|
||||
} catch (err) {
|
||||
txn.abort();
|
||||
throw err;
|
||||
}
|
||||
await txn.complete();
|
||||
return new EncryptionResult(encryptedContent, roomKeyMessage);
|
||||
} finally {
|
||||
if (session) {
|
||||
session.free();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
_needsToRotate(session, createdAt, encryptionParams) {
|
||||
let rotationPeriodMs = 604800000; // default
|
||||
if (Number.isSafeInteger(encryptionParams?.rotation_period_ms)) {
|
||||
rotationPeriodMs = encryptionParams?.rotation_period_ms;
|
||||
}
|
||||
let rotationPeriodMsgs = 100; // default
|
||||
if (Number.isSafeInteger(encryptionParams?.rotation_period_msgs)) {
|
||||
rotationPeriodMsgs = encryptionParams?.rotation_period_msgs;
|
||||
}
|
||||
|
||||
if (this._now() > (createdAt + rotationPeriodMs)) {
|
||||
return true;
|
||||
}
|
||||
if (session.message_index() >= rotationPeriodMsgs) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
_encryptContent(roomId, session, type, content) {
|
||||
const plaintext = JSON.stringify({
|
||||
room_id: roomId,
|
||||
type,
|
||||
content
|
||||
});
|
||||
const ciphertext = session.encrypt(plaintext);
|
||||
|
||||
const encryptedContent = {
|
||||
algorithm: MEGOLM_ALGORITHM,
|
||||
sender_key: this._account.identityKeys.curve25519,
|
||||
ciphertext,
|
||||
session_id: session.session_id(),
|
||||
device_id: this._ownDeviceId
|
||||
};
|
||||
|
||||
return encryptedContent;
|
||||
}
|
||||
|
||||
_createRoomKeyMessage(session, roomId) {
|
||||
return {
|
||||
room_id: roomId,
|
||||
session_id: session.session_id(),
|
||||
session_key: session.session_key(),
|
||||
algorithm: MEGOLM_ALGORITHM,
|
||||
// chain_index: session.message_index()
|
||||
}
|
||||
}
|
||||
|
||||
_storeAsInboundSession(outboundSession, roomId, txn) {
|
||||
const {identityKeys} = this._account;
|
||||
const claimedKeys = {ed25519: identityKeys.ed25519};
|
||||
const session = new this._olm.InboundGroupSession();
|
||||
try {
|
||||
session.create(outboundSession.session_key());
|
||||
const sessionEntry = {
|
||||
roomId,
|
||||
senderKey: identityKeys.curve25519,
|
||||
sessionId: session.session_id(),
|
||||
session: session.pickle(this._pickleKey),
|
||||
claimedKeys,
|
||||
};
|
||||
txn.inboundGroupSessions.set(sessionEntry);
|
||||
return sessionEntry;
|
||||
} finally {
|
||||
session.free();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
class EncryptionResult {
|
||||
constructor(content, roomKeyMessage) {
|
||||
this.content = content;
|
||||
this.roomKeyMessage = roomKeyMessage;
|
||||
}
|
||||
}
|
Loading…
Reference in a new issue